Search Results - (( java implication based algorithm ) OR ( using devices mining algorithm ))
Search alternatives:
- implication based »
- java implication »
- mining algorithm »
- devices mining »
- using devices »
-
1
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
2
Frequent itemset mining in high dimensional data: a review
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Discovering decision algorithm from a distance relay event report
Published 2009“…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
Get full text
Get full text
Get full text
Article -
4
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
5
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
6
Mining Web usage using FRS
Published 2018Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
-
9
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…To this end, the proposed execution models were tested with multiple MDSM applications mapping to a real-world use-case for activity detection using MECC systems. …”
Get full text
Get full text
Get full text
Thesis -
10
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…Also the algorithm using segmentation strategy is using frontier base algorithm for exploring divided area. …”
Get full text
Get full text
Get full text
Article -
11
A systematic literature review on the impact of data mining on workforce privacy and employment practices: ethical concerns and risks
Published 2025“…Another concern is using emotional data for employee profiling. Emotional data can be used to monitor work performance and behaviour through wearable devices or cameras. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
14
-
15
A Review on Predictive Model for Heart Disease using Wearable Devices Datasets
Published 2024“…Other approaches, such as Naive Bayes, Support Vector Machine, and Decision Tree algorithms, are used to analyze medical data sets to forecast cardiac disease. …”
Get full text
Get full text
Get full text
Article -
16
MiMaLo: advanced normalization method for mobile malware detection
Published 2022“…This research used data mining classification approach method and validates it using ten fold cross validation. …”
Get full text
Get full text
Get full text
Article -
17
Network problems detection and classification by analyzing syslog data
Published 2016“…The method used data mining tool to classify the syslog messages while the description part of the syslog message was used for classification process. …”
Get full text
Get full text
Get full text
Thesis -
18
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…A service offered by a bank or other financial institution that enables its users to execute financial transactions remotely using a mobile device, such as a smartphone or tablet, is known as mobile banking. …”
Get full text
Get full text
Get full text
Article -
19
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…As a result, numerous attackers or hackers are taking advantage of this chance to employ cryptojacking to gain access to a victim's computer or other device resources and mine cryptocurrency without the users' permission. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
Get full text
Get full text
Get full text
Thesis
